LogoLogo
  • 📘Introduction
    • What is Forge?
    • Why We Built Forge
  • 🧠How Forge Works
    • Core Architecture
    • Agent System Overview
  • Model Context Protocol (MCP)
  • On-Chain Data Indexing
  • AI Query Handling
  • ⚙️Using Forge
    • Setting Up Forge
    • How to Ask Questions
  • Supported Use Cases
  • Interacting with Agents
  • Limitations and Data Scope
  • 🛠️Advanced Features
    • Agent Personalities and Prompt Logic
  • Creating Custom Agents
  • Integrating External APIs
  • Running Multi-Agent Workflows
  • Token Behavior Tracking
  • Suspicious Wallet Detection
  • 📀Forge Modules
    • Liquidity Pool Scanner
  • LP Burner Tracker
  • Telegram Sniper Detector
  • Contract Creator Profiler
  • Whale Movement Watcher
  • ⚙️Developer Tools
    • Custom Prompt Engineering
  • 📃Appendix
    • Glossary
    • Security and Privacy
    • Roadmap and Vision
Powered by GitBook
On this page
  • What It Does
  • Wallet Linking
  • How It Helps
  • Detection Use Cases
  • Telegram Join Timing
  • Group Metadata
  • Custom Group Tracking
Export as PDF

Telegram Sniper Detector

Many of the most aggressive buys on new tokens aren’t random — they’re triggered by Telegram. Deployers leak info to private chats, snipers monitor KOL groups, and wallets flood in the second a new project is mentioned. The Telegram Sniper Detector module in Forge was built to catch this exact behavior.

It links wallet activity to group joins, traces deployer movements across Telegram communities, and helps you understand if a meme is being farmed by insiders.


What It Does

This module monitors:

  • Known Telegram groups where snipers and KOLs gather

  • Wallets linked to those groups

  • Deployers who join groups before launching tokens

  • Timing between group joins and token buys

  • Repeat wallet appearances across multiple launches

It detects Telegram-connected behavior, which often signals insider coordination, KOL baiting, or stealth sniper farms.


Wallet Linking

Wallets are linked to Telegram using:

  • Wallet signatures inside group chats (via DegenBox bots, snipe groups, sniper bot wallets)

  • Links between deployers and known group metadata

  • Funding patterns tied to sniper bot clusters

Once a wallet is identified in a group, Forge tracks when it:

  • Joins a chat

  • Sends messages (if available)

  • Buys tokens shortly after

  • Deploys a token with metadata posted in the group


How It Helps

Ask a question like:

“Any Telegram links for this token?”

Forge might respond:

“Token $WARP was deployed by wallet 7AuCty3w..., which joined ‘SolanaAlphaHub’ 1 hour before launch. First 3 buyers also present in same group. Pattern matches previous sniper farm setups.”

You can also run standalone queries like:

  • “What tokens were launched by Telegram-linked wallets today?”

  • “Which Telegram group is most active in fresh launches?”

  • “Has this wallet joined any snipe groups?”


Detection Use Cases

This module is especially useful for:

  • Sniper Identification – flagging wallets that follow every KOL call

  • Insider Bait Detection – catching tokens pushed in chats before they rug

  • Deployer Monitoring – seeing if a dev is part of known rug circles

  • Front-Run Tracing – identifying wallets that buy tokens seconds after group joins


Telegram Join Timing

Forge analyzes the timing between a wallet joining a group and:

  • A token deployment

  • First token buys

  • Sniper wallet movements

If these events happen within 1–10 minutes, it’s flagged as high correlation.

Example output:

“Wallet 9xTzK5... joined 'AlphaSnipers' 3 minutes before buying $DOGEZILLA. Bought 2 seconds after launch. Known repeat pattern across 8 tokens.”


Group Metadata

Each Telegram group tracked by Forge includes:

  • Group name and alias

  • Description (KOL, sniper hub, launchpad group, etc.)

  • Linked wallet activity

  • Risk rating (based on rug frequency from members)

This lets you track which groups are the most predictive — or the most dangerous.


Custom Group Tracking

If you run a private Forge instance, you can add:

  • Your own list of Telegram groups

  • Custom rules for detection

  • Blacklist or whitelist filters

  • Alerts for wallets joining tracked chats

You can even run daily reports on what groups were most active in launching or sniping tokens.

PreviousLP Burner TrackerNextContract Creator Profiler

Last updated 12 days ago